Terrorism and the Limits of Citizenship: Remaking Citizenship in a Time of Crisis
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Combating Islamic Extremist Terrorism 1
CGT 1/22/07 11:30 AM Page 1 Combating Islamic Extremist Terrorism 1 OVERALL GRADE D+ Al-Qaeda headquarters C+ Al-Qaeda affiliated groups C– Al-Qaeda seeded groups D+ Al-Qaeda inspired groups D Sympathizers D– 1 CGT 1/22/07 11:30 AM Page 2 2 COMBATING ISLAMIC EXTREMIST TERRORISM ive years after the September 11 attacks, is the United States win- ning or losing the global “war on terror”? Depending on the prism through which one views the conflict or the metrics used Fto gauge success, the answers to the question are starkly different. The fact that the American homeland has not suffered another attack since 9/11 certainly amounts to a major achievement. U.S. military and security forces have dealt al-Qaeda a severe blow, cap- turing or killing roughly three-quarters of its pre-9/11 leadership and denying the terrorist group uncontested sanctuary in Afghanistan. The United States and its allies have also thwarted numerous terror- ist plots around the world—most recently a plan by British Muslims to simultaneously blow up as many as ten jetliners bound for major American cities. Now adjust the prism. To date, al-Qaeda’s top leaders have sur- vived the superpower’s most punishing blows, adding to the near- mythical status they enjoy among Islamic extremists. The terrorism they inspire has continued apace in a deadly cadence of attacks, from Bali and Istanbul to Madrid, London, and Mumbai. Even discount- ing the violence in Iraq and Afghanistan, the tempo of terrorist attacks—the coin of the realm in the jihadi enterprise—is actually greater today than before 9/11. -
Foreign Terrorist Organizations
Order Code RL32223 CRS Report for Congress Received through the CRS Web Foreign Terrorist Organizations February 6, 2004 Audrey Kurth Cronin Specialist in Terrorism Foreign Affairs, Defense, and Trade Division Huda Aden, Adam Frost, and Benjamin Jones Research Associates Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Foreign Terrorist Organizations Summary This report analyzes the status of many of the major foreign terrorist organizations that are a threat to the United States, placing special emphasis on issues of potential concern to Congress. The terrorist organizations included are those designated and listed by the Secretary of State as “Foreign Terrorist Organizations.” (For analysis of the operation and effectiveness of this list overall, see also The ‘FTO List’ and Congress: Sanctioning Designated Foreign Terrorist Organizations, CRS Report RL32120.) The designated terrorist groups described in this report are: Abu Nidal Organization (ANO) Abu Sayyaf Group (ASG) Al-Aqsa Martyrs Brigade Armed Islamic Group (GIA) ‘Asbat al-Ansar Aum Supreme Truth (Aum) Aum Shinrikyo, Aleph Basque Fatherland and Liberty (ETA) Communist Party of Philippines/New People’s Army (CPP/NPA) Al-Gama’a al-Islamiyya (Islamic Group, IG) HAMAS (Islamic Resistance Movement) Harakat ul-Mujahidin (HUM) Hizballah (Party of God) Islamic Movement of Uzbekistan (IMU) Jaish-e-Mohammed (JEM) Jemaah Islamiya (JI) Al-Jihad (Egyptian Islamic Jihad) Kahane Chai (Kach) Kurdistan Workers’ Party (PKK, KADEK) Lashkar-e-Tayyiba -
Filling Terrorism Gaps: Veos, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan
PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 PNNL-25727 Filling Terrorism Gaps: VEOs, Evaluating Databases, and Applying Risk Terrain Modeling to Terrorism RH Hagan August 2016 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Pacific Northwest National Laboratory Richland, Washington 99352 PNNL-25727 Abstract This paper aims to address three issues: the lack of literature differentiating terrorism and violent extremist organizations (VEOs), terrorism incident databases, and the applicability of Risk Terrain Modeling (RTM) to terrorism. Current open source literature and publicly available government sources do not differentiate between terrorism and VEOs; furthermore, they fail to define them. Addressing the lack of a comprehensive comparison of existing terrorism data sources, a matrix comparing a dozen terrorism databases is constructed, providing insight toward the array of data available. RTM, a method for spatial risk analysis at a micro level, has some applicability to terrorism research, particularly for studies looking at risk indicators of terrorism. Leveraging attack data from multiple databases, combined with RTM, offers one avenue for closing existing research gaps in terrorism literature. iii Acknowledgments The author would like to sincerely thank several individuals for their contributions to this research. My mentor, Chrissie Noonan, for her guidance and support throughout this process, Carolyn Cramer for her operational support and insight, Alex Stephan, Lead for the Special Programs and Scientific Studies Team at PNNL, George Muller for his support and direction, Hannah Trump for her substantial help with the appendices, and Dan Fortin, Sam Chatterjee, and Thomas Johansen for the constant discussions. -
Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing
CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that helps improve policy and EDUCATION AND THE ARTS decisionmaking through research and analysis. ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE This electronic document was made available from www.rand.org as a public service INFRASTRUCTURE AND of the RAND Corporation. TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS Skip all front matter: Jump to Page 16 NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY Support RAND SCIENCE AND TECHNOLOGY Purchase this document TERRORISM AND Browse Reports & Bookstore HOMELAND SECURITY Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Corporation View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non- commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation conference proceedings series. RAND conference proceedings present a collection of papers delivered at a conference or a summary of the conference. The material herein has been vetted by the conference attendees and both the introduction and the post-conference material have been re- viewed and approved for publication by the sponsoring research unit at RAND. -
In Re: Terrorist Attacks on September 11, 2001
Case 1:03-md-01570-GBD-SN Document 3671 Filed 08/01/17 Page 1 of 33 UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK ____________________________________ ) IN RE: TERRORIST ATTACKS ON ) Civil Action No. 03 MDL 1570 (GBD) SEPTEMBER 11, 2001 ) ECF Case ____________________________________ ) This document relates to: Ashton, et al. v. al Qaeda, et al., No. 02-cv-6977 Federal Insurance Co., et al. v. al Qaida, et al., No. 03-cv-6978 Thomas Burnett, Sr., et al. v. Al Baraka Inv. & Dev. Corp., et al., No. 03-cv-9849 Continental Casualty Co., et al. v. Al Qaeda, et al., No. 04-cv-5970 Cantor Fitzgerald Assocs., et al. v. Akida Inv. Co., et al. No. 04-cv-7065 Euro Brokers Inc., et al. v. Al Baraka Inv. & Dev. Corp., et al., No. 04-cv-7279 McCarthy, et al. v. Kingdom of Saudi Arabia, No. 16-cv-8884 Aguilar, et al. v. Kingdom of Saudi Arabia, et al., No. 16-cv-9663 Addesso, et al. v. Kingdom of Saudi Arabia, et al., No. 16-cv-9937 Hodges, et al. v. Kingdom of Saudi Arabia, et al., No. 17-cv-117 DeSimone v. Kingdom of Saudi Arabia, No. 17-cv-348 Aiken, et al v. Kingdom of Saudi Arabia, et al., No. 17-cv-450 The Underwriting Members of Lloyd’s Syndicate 53, et al. v. Kingdom of Saudi Arabia, et al., No. 17-cv-2129 The Charter Oak Fire Insurance Co., et al. v. Al Rajhi Bank, et al. No. 17-cv-02651 Abarca, et al. -
Federal Bureau of Investigation Department of Homeland Security
Federal Bureau of Investigation Department of Homeland Security Strategic Intelligence Assessment and Data on Domestic Terrorism Submitted to the Permanent Select Committee on Intelligence, the Committee on Homeland Security, and the Committee of the Judiciary of the United States House of Representatives, and the Select Committee on Intelligence, the Committee on Homeland Security and Governmental Affairs, and the Committee of the Judiciary of the United States Senate May 2021 Page 1 of 40 Table of Contents I. Overview of Reporting Requirement ............................................................................................. 2 II. Executive Summary ......................................................................................................................... 2 III. Introduction...................................................................................................................................... 2 IV. Strategic Intelligence Assessment ................................................................................................... 5 V. Discussion and Comparison of Investigative Activities ................................................................ 9 VI. FBI Data on Domestic Terrorism ................................................................................................. 19 VII. Recommendations .......................................................................................................................... 27 Appendix .................................................................................................................................................... -
9/11 Report”), July 2, 2004, Pp
Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5. -
9-11 and Terrorist Travel- Full
AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States 9/11 AND TERRORIST TRAVEL Staff Report of the National Commission on Terrorist Attacks Upon the United States By Thomas R. Eldridge Susan Ginsburg Walter T. Hempel II Janice L. Kephart Kelly Moore and Joanne M. Accolla, Staff Assistant Alice Falk, Editor Note from the Executive Director The Commission staff organized its work around specialized studies, or monographs, prepared by each of the teams. We used some of the evolving draft material for these studies in preparing the seventeen staff statements delivered in conjunction with the Commission’s 2004 public hearings. We used more of this material in preparing draft sections of the Commission’s final report. Some of the specialized staff work, while not appropriate for inclusion in the report, nonetheless offered substantial information or analysis that was not well represented in the Commission’s report. In a few cases this supplemental work could be prepared to a publishable standard, either in an unclassified or classified form, before the Commission expired. This study is on immigration, border security and terrorist travel issues. It was prepared principally by Thomas Eldridge, Susan Ginsburg, Walter T. Hempel II, Janice Kephart, and Kelly Moore, with assistance from Joanne Accolla, and editing assistance from Alice Falk. As in all staff studies, they often relied on work done by their colleagues. This is a study by Commission staff. While the Commissioners have been briefed on the work and have had the opportunity to review earlier drafts of some of this work, they have not approved this text and it does not necessarily reflect their views. -
How Anwar Al-Awlaki Became the Face of Western Jihad
As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Jihad Alexander Meleagrou-Hitchens Foreword by Lord Carlile of Berriew QC A policy report published by the International Centre for the Study of Radicalisation and Political Violence (ICSR) ABOUT ICSR The International Centre for the Study of Radicalisation and Political Violence (ICSR) is a unique partnership in which King’s College London, the University of Pennsylvania, the Interdisciplinary Center Herzliya (Israel), the Regional Center for Conflict Prevention Amman (Jordan) and Georgetown University are equal stakeholders. The aim and mission of ICSR is to bring together knowledge and leadership to counter the growth of radicalisation and political violence. For more information, please visit www.icsr.info. CONTACT DETAILS For questions, queries and additional copies of this report, please contact: ICSR King’s College London 138 –142 Strand London WC2R 1HH United Kingdom T. +44 (0)20 7848 2065 F. +44 (0)20 7848 2748 E. [email protected] Like all other ICSR publications, this report can be downloaded free of charge from the ICSR website at www.icsr.info. © ICSR 2011 AUTHOR’S NOTE This report contains many quotes from audio lectures as well as online forums and emails. All of these have been reproduced in their original syntax, including all spelling and grammatical errors. Contents Foreword 2 Letter of Support from START 3 Glossary of Terms 4 Executive Summary 6 Chapter 1 Introduction 9 Chapter 2 Methodology and Key Concepts 13 Social Movement Theory 13 Framing and -
20121211 IACHR Petition FINAL
TO THE HONORABLE MEMBERS OF THE INTER-AMERICAN COMMISSION ON HUMAN RIGHTS, ORGANIZATION OF AMERICAN STATES PETITION ALLEGING VIOLATIONS OF THE HUMAN RIGHTS OF JOSE PADILLA and ESTELA LEBRON BY THE UNITED STATES OF AMERICA WITH A REQUEST FOR AN INVESTIGATION AND HEARING ON THE MERITS By the undersigned, appearing as counsel for petitioners UNDER THE PROVISIONS OF ARTICLE 23 OF THE RULES OF PROCEDURE OF THE INTER-AMERICAN COMMISSION ON HUMAN RIGHTS Steven M. Watt Human Rights Program American Civil Liberties Union 125 Broad Street, 18th Floor New York, NY, 10004 F/(212)-549-2654 P/(212)-519-7870 Hope Metcalf Ingrid Deborah Francois, Law Student Intern Sheng Li, Law Student Intern Alaina Varvaloucas, Law Student Intern Allard K. Lowenstein Human Rights Clinic Yale Law School 127 Wall St. New Haven, CT 06520 P/(203)-432-9404 Table of Contents INTRODUCTION ..................................................................................................................................................................... 1 FACTUAL AND PROCEDURAL BACKGROUND ................................................................................................ 3 I. Petitioner Estela Lebron ............................................................................................................................................. 3 II. Seizure, Detention, and Interrogation of Jose Padilla ................................................................................... 3 A. Initial Arrest and Detention Under the Material Witness Act ......................................................... -
The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West
New America Foundation National Security Studies Program Policy Paper The Militant Pipeline Between the Afghanistan-Pakistan Border Region and the West Paul Cruickshank Second Edition July 2011; First Edition February 2010 Of the 32 “serious” jihadist terrorist plots against the West between 2004 and 2011, 53 percent had operational or training links to established jihadist groups in Pakistan and just 6 percent to Yemen. A decade after 9/11, despite growing concerns over Yemen, entry to join the fighting in Afghanistan, the presence of al Pakistan’s Federally Administered Tribal Areas (FATA) and Qaeda, and its sustained ability to train recruits and swaths of the country’s northwest arguably remain al Qaeda persuade them to launch attacks in the West, continue to ’s main safe haven, and the area from which it can hatch its make the FATA what President Obama called in 2009 “the most dangerous plots against the West. 1 Al Qaeda’s most dangerous place in the world.” 4 presence in these areas has long threatened international security. It was in Peshawar in Pakistan’s northwest that al U.S. officials have recently suggested that when it comes to Qaeda was founded in 1988, and ever since Pakistan’s the U.S. homeland, al Qaeda’s affiliate in Yemen – al Qaeda border region with Afghanistan has been a gateway for in the Arabian Peninsula (AQAP) – could now pose a recruits joining the terrorist network and its affiliates, and greater threat than “al Qaeda Central” in the tribal areas of an area in which its senior figures have felt comfortable Pakistan. -
The New Insurgents: a Select Review of Recent Literature on Terrorism and Insurgency
The New Insurgents: A Select Review of Recent Literature on Terrorism and Insurgency George Michael US Air Force Counterproliferation Center Maxwell Air Force Base, Alabama THE NEW INSURGENTS: A Select Review of Recent Literature on Terrorism and Insurgency by George Michael USAF Counterproliferation Center 325 Chennault Circle Maxwell Air Force Base, Alabama 36112-6427 March 2014 Disclaimer The opinions, conclusions, and recommendations expressed or implied in this publication are those of the author and do not necessarily reflect the views of the Air University, Air Force, or Department of Defense. ii Contents Chapter Page Disclaimer .............................................................................................. ii About the Author..................................................................................... v Introduction ........................................................................................... vii 1 Domestic Extremism and Terrorism in the United States ....................... 1 J.M. Berger, Jihad Joe: Americans Who Go to War in the Name of Islam ................................................................................................ 3 Catherine Herridge, The Next Wave: On the Hunt for Al Qaeda’s American Recruits ........................................................................... 8 Martin Durham, White Rage: The Extreme Right and American Politics ........................................................................................... 11 2 Jihadist Insurgent Strategy ....................................................................